We're sorry but this page doesn't work properly without JavaScript enabled. Please enable it to continue.
Feedback

Footprinting for security auditors

Formale Metadaten

Titel
Footprinting for security auditors
Serientitel
Anzahl der Teile
611
Autor
Lizenz
CC-Namensnennung 2.0 Belgien:
Sie dürfen das Werk bzw. den Inhalt zu jedem legalen Zweck nutzen, verändern und in unveränderter oder veränderter Form vervielfältigen, verbreiten und öffentlich zugänglich machen, sofern Sie den Namen des Autors/Rechteinhabers in der von ihm festgelegten Weise nennen.
Identifikatoren
Herausgeber
Erscheinungsjahr
Sprache
Produktionsjahr2017

Inhaltliche Metadaten

Fachgebiet
Genre
Abstract
Footprinting is one of the most important techniques security auditing, sinceallows them gather information about the target we are analysing. In the process to collect information about our target we can diferentiate twophases,the first one is where we obtain public information without interactwith the objective and the second one is where we can use tools such as portscanning. In the process to collect information about our target we can diferentiate twophases, the first one is the passive where we obtain public information aboutour target without interact with the objective and the second one is the phasewhere we can use tools such as port scanning or banner grabbing. These could be the talking points: 1.Introduction to footprinting I will comment the main footprinting phases: Passive Footprinting where we collect public information and building a map ofthe server or domain objective, without interacting directwith it. Active Footprinting where there is an active target identification through andtechniques such as port scanning, and different identifications of services,operating systems and server banners. 2.Footprinting tools For applying footprinting techniques we can use tools for obtain domaininformation such as whois,apply inverse querys from DNS and name servers. Alsowe can use third services such as robtex and serversniff for obtain moreinformation. We can use public information sources,between these tools we canhighlight shodan,scans,zmap and censys 3.Port scanning with nmap With nmap we can check ports open for a target ip or domain and with nmapscripts we can check vulnerabilities in open ports For example,if the mysqlport is opened,check if the server has some vulnerability relationed with thisservice.I will show nmap scripts for checking this vulnerabilities.